Case-based Critical Thinking Questions
Case 3-1
Judy wants to be able to validate the XML documents that she uses for recipes. These documents include numeric elements that specify ingredient amounts and cooking times, so you recommend that she use a schema instead of a DTD, and you teach her some of the key facts about schemas.
Which of the following is NOT an advantage of schemas over DTDs?
A. They are more flexible than DTDs in dealing with mixed content.
B. They support more data types than DTDs.
C. They provide better support for namespaces.
D. They are simpler to create and maintain.
Answer: D
You might also like to view...
The field you use for the primary key should have a checkmark in the _____ box.
A. Required B. Indexed C. Validated D. Unique
If your colleague is looking to design an advertisement to sell an online backup system that essentially mirrors the work saved on a user's hard drive, you tell her that there is a gradient she can suggest to her freelance graphic designer that will shade using symmetric linear gradients on either side of a starting point. What is the name of the gradient you suggest to your colleague?
a. Reflected b. Angle c. Diamond d. Mirrored
Match each term in the second column with its correct definition in the first column by writing the letter of the term on the blank line in front of the correct definition.
_____ 1. Two or more computers that share resources. _____ 2. A personal computer that connects to a server. _____ 3. A network that has all connected devices or nodes located in the same physical location. _____ 4. Standards that define the way data is transmitted over a local area network. _____ 5. Creates a private network through the public network (Internet), allowing remote users to access a local area network (LAN) securely without needing dedicated lines. _____ 6. A device that connects two or more networks together. _____ 7. The rules for communication between devices. _____ 8. The act of gaining unauthorized access to a computer system or network. _____ 9. Email messages and IMs that appear to be from those you do business with, designed to trick you into revealing information, such as usernames and passwords for your accounts. _____ 10. A situation in which sensitive data is stolen or viewed by someone who is not authorized to do so. A Client B Computer network C Data breach D Ethernet E Hacking F Local area network (LAN) G Phishing H Protocols I Router J Virtual private network (VPN)
How does an IDS let the network administrators know if an attack is taking place?
What will be an ideal response?